Deck 11: Securing Your Network

ملء الشاشة (f)
exit full mode
سؤال
____ can translate an IP address from a private network to a different address used on a public network or the Internet.

A)IPSec
B)DHCP
C)TCP/IP
D)NAT
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ goes to the source of the TCP/IP communications by securing IP in its Network layer, or Layer 3.

A)SSL
B)TLS
C)IPSec
D)RSA
سؤال
Application level gateways are restricted to a single level of filtering.
سؤال
You can configure Windows Firewall for any network connection.
سؤال
In ____ routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.

A)source
B)destination
C)fast
D)designated
سؤال
Virtual private networks (VPNs)can be set up to provide secure remote communications.
سؤال
On the sending computer using IPSec, the data is encrypted at the ____ layer.

A)Transport
B)Presentation
C)Session
D)Application
سؤال
Which of the following organizations sponsors the Certified Information Systems Security Professional (CISSP)certification program?

A)American Society for Industrial Security (ASIS)
B)InfraGard
C)Information Systems Security Association (ISSA)
D)Information Security Forum (ISF)
سؤال
Stateless filtering screens on the basis of the context of the communication.
سؤال
A(n)____ is information that a Web server stores on a client computer, such as the client's preferences when accessing a particular Web site, or where the client has been on the Web site.

A)applet
B)cookie
C)scanner
D)listener
سؤال
A(n)____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system.

A)remote procedure call
B)virus
C)error handler
D)hoax
سؤال
____ is unrequested e-mail that is sent to hundreds, thousands, or even millions of users.

A)Freeware
B)Adware
C)Spam
D)Malware
سؤال
A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.

A)gateway
B)router
C)switch
D)hub
سؤال
The ____ layer reads IP packet protocol address information and forwards each packet along the most expedient route for efficient network communications.

A)Data Link
B)Transport
C)Network
D)Physical
سؤال
A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.
سؤال
Attacks on wireless networks are sometimes called ____ -drives because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.

A)war
B)battle
C)spy
D)surveillance
سؤال
Network devices such as switches use ____, so that when there is heavy network traffic, they have a means to store data until it can be forwarded to the right destination.

A)magnetic disks
B)registers
C)buffers
D)CD-ROMs
سؤال
____ engineering, in relation to computer system attacks, refers to the use of human interaction to gain access to a system or to do damage.

A)Social
B)Psychological
C)Interpersonal
D)Communications
سؤال
On a UNIX/Linux system, IPSec can be configured using the ____ function with the spdadd instruction in a shell script.

A)attributes()
B)standards()
C)encrypt()
D)setkey()
سؤال
The Trojan horse named ____ is designed to give the attacker the target's user account and password.

A)NetBus
B)Backdoor.IRC
C)Yoink
D)Trojan.Idly
سؤال
Identify five border points that the strongest border security is designed to protect.
سؤال
Identify five Microsoft Routing and Remote Access Services that enable or manage remote access to Windows Server 2003.
سؤال
_________________________ is designed to "provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality" (as defined in the network standard document, RFC 2406).
سؤال
A(n)_________________________ is a portion of a network that exists between two or more networks that have different security measures in place.
سؤال
____ storage is employed by a computer system to house frequently used data for quick access.

A)RAM
B)Register
C)Cache
D)CD-ROM
سؤال
To ensure that the IPTables service starts automatically each time you boot the operating system, use the ____ command.

A)service iptables start
B)chkconfig --level 345 iptables on
C)chkconfig ipchains off
D)/sbin/service iptables save
سؤال
The NAT setup offers addresses in the ____ range as the default option.

A)10.0.0.0
B)172.16.0.0
C)192.168.0.0
D)224.0.0.0
سؤال
A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.
سؤال
What are the main elements involved in a wireless network attack?
سؤال
Proxies functioning as ____-level gateways create a virtual tunnel between the proxy and an external computer, such as a Web server.

A)network
B)presentation
C)presentation
D)circuit
سؤال
A set of filtering rules, called a ____, is applied to packets through the use of IPTables.

A)link
B)group
C)cluster
D)chain
سؤال
Provide a description of service packs.
سؤال
A DoS attack that floods a host with packets from many bogus source addresses is a form of ____________________.
سؤال
Identify four tasks that can be fulfilled by a proxy server.
سؤال
Identify four network hardening techniques.
سؤال
If you want to block access to Telnet using a firewall, then consider blocking TCP/UDP port ____.

A)21
B)23
C)80
D)119
سؤال
____________________ involves taking specific actions to block or prevent attacks by means of operating system and network security methods.
سؤال
How does a source routing attack work?
سؤال
How does a buffer attack work?
سؤال
What are the advantages of using Network Address Translation (NAT)?
سؤال
Match between columns
command line interface that enables you to configure packet filter rules through the use of tables.
digital certificate
command line interface that enables you to configure packet filter rules through the use of tables.
National Security Institute (NSI)
command line interface that enables you to configure packet filter rules through the use of tables.
worm
command line interface that enables you to configure packet filter rules through the use of tables.
remote denial of service (DoS)attack
command line interface that enables you to configure packet filter rules through the use of tables.
spyware
command line interface that enables you to configure packet filter rules through the use of tables.
sniffer software
command line interface that enables you to configure packet filter rules through the use of tables.
IPTables
command line interface that enables you to configure packet filter rules through the use of tables.
access control list (ACL)
command line interface that enables you to configure packet filter rules through the use of tables.
Security Level Configuration
might take the form of simply flooding a system with more packets than it can handle.
digital certificate
might take the form of simply flooding a system with more packets than it can handle.
National Security Institute (NSI)
might take the form of simply flooding a system with more packets than it can handle.
worm
might take the form of simply flooding a system with more packets than it can handle.
remote denial of service (DoS)attack
might take the form of simply flooding a system with more packets than it can handle.
spyware
might take the form of simply flooding a system with more packets than it can handle.
sniffer software
might take the form of simply flooding a system with more packets than it can handle.
IPTables
might take the form of simply flooding a system with more packets than it can handle.
access control list (ACL)
might take the form of simply flooding a system with more packets than it can handle.
Security Level Configuration
used between network computers to verify the authenticity of the communication.
digital certificate
used between network computers to verify the authenticity of the communication.
National Security Institute (NSI)
used between network computers to verify the authenticity of the communication.
worm
used between network computers to verify the authenticity of the communication.
remote denial of service (DoS)attack
used between network computers to verify the authenticity of the communication.
spyware
used between network computers to verify the authenticity of the communication.
sniffer software
used between network computers to verify the authenticity of the communication.
IPTables
used between network computers to verify the authenticity of the communication.
access control list (ACL)
used between network computers to verify the authenticity of the communication.
Security Level Configuration
tool that may be used to designate a trusted device.
digital certificate
tool that may be used to designate a trusted device.
National Security Institute (NSI)
tool that may be used to designate a trusted device.
worm
tool that may be used to designate a trusted device.
remote denial of service (DoS)attack
tool that may be used to designate a trusted device.
spyware
tool that may be used to designate a trusted device.
sniffer software
tool that may be used to designate a trusted device.
IPTables
tool that may be used to designate a trusted device.
access control list (ACL)
tool that may be used to designate a trusted device.
Security Level Configuration
used by attackers to associate IP address information with account and password communications.
digital certificate
used by attackers to associate IP address information with account and password communications.
National Security Institute (NSI)
used by attackers to associate IP address information with account and password communications.
worm
used by attackers to associate IP address information with account and password communications.
remote denial of service (DoS)attack
used by attackers to associate IP address information with account and password communications.
spyware
used by attackers to associate IP address information with account and password communications.
sniffer software
used by attackers to associate IP address information with account and password communications.
IPTables
used by attackers to associate IP address information with account and password communications.
access control list (ACL)
used by attackers to associate IP address information with account and password communications.
Security Level Configuration
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
digital certificate
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
National Security Institute (NSI)
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
worm
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
remote denial of service (DoS)attack
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
spyware
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
sniffer software
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
IPTables
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
access control list (ACL)
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
Security Level Configuration
a list of permit and deny conditions that can be associated with a particular router interface.
digital certificate
a list of permit and deny conditions that can be associated with a particular router interface.
National Security Institute (NSI)
a list of permit and deny conditions that can be associated with a particular router interface.
worm
a list of permit and deny conditions that can be associated with a particular router interface.
remote denial of service (DoS)attack
a list of permit and deny conditions that can be associated with a particular router interface.
spyware
a list of permit and deny conditions that can be associated with a particular router interface.
sniffer software
a list of permit and deny conditions that can be associated with a particular router interface.
IPTables
a list of permit and deny conditions that can be associated with a particular router interface.
access control list (ACL)
a list of permit and deny conditions that can be associated with a particular router interface.
Security Level Configuration
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
digital certificate
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
National Security Institute (NSI)
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
worm
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
remote denial of service (DoS)attack
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
spyware
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
sniffer software
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
IPTables
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
access control list (ACL)
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
Security Level Configuration
provides information about all kinds of security threats.
digital certificate
provides information about all kinds of security threats.
National Security Institute (NSI)
provides information about all kinds of security threats.
worm
provides information about all kinds of security threats.
remote denial of service (DoS)attack
provides information about all kinds of security threats.
spyware
provides information about all kinds of security threats.
sniffer software
provides information about all kinds of security threats.
IPTables
provides information about all kinds of security threats.
access control list (ACL)
provides information about all kinds of security threats.
Security Level Configuration
سؤال
Provide a general description for how routers are used in border security.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Securing Your Network
1
____ can translate an IP address from a private network to a different address used on a public network or the Internet.

A)IPSec
B)DHCP
C)TCP/IP
D)NAT
D
2
____ goes to the source of the TCP/IP communications by securing IP in its Network layer, or Layer 3.

A)SSL
B)TLS
C)IPSec
D)RSA
C
3
Application level gateways are restricted to a single level of filtering.
False
4
You can configure Windows Firewall for any network connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
In ____ routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.

A)source
B)destination
C)fast
D)designated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Virtual private networks (VPNs)can be set up to provide secure remote communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
On the sending computer using IPSec, the data is encrypted at the ____ layer.

A)Transport
B)Presentation
C)Session
D)Application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following organizations sponsors the Certified Information Systems Security Professional (CISSP)certification program?

A)American Society for Industrial Security (ASIS)
B)InfraGard
C)Information Systems Security Association (ISSA)
D)Information Security Forum (ISF)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Stateless filtering screens on the basis of the context of the communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
A(n)____ is information that a Web server stores on a client computer, such as the client's preferences when accessing a particular Web site, or where the client has been on the Web site.

A)applet
B)cookie
C)scanner
D)listener
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
A(n)____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system.

A)remote procedure call
B)virus
C)error handler
D)hoax
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ is unrequested e-mail that is sent to hundreds, thousands, or even millions of users.

A)Freeware
B)Adware
C)Spam
D)Malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.

A)gateway
B)router
C)switch
D)hub
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
The ____ layer reads IP packet protocol address information and forwards each packet along the most expedient route for efficient network communications.

A)Data Link
B)Transport
C)Network
D)Physical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Attacks on wireless networks are sometimes called ____ -drives because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.

A)war
B)battle
C)spy
D)surveillance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
Network devices such as switches use ____, so that when there is heavy network traffic, they have a means to store data until it can be forwarded to the right destination.

A)magnetic disks
B)registers
C)buffers
D)CD-ROMs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
____ engineering, in relation to computer system attacks, refers to the use of human interaction to gain access to a system or to do damage.

A)Social
B)Psychological
C)Interpersonal
D)Communications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
On a UNIX/Linux system, IPSec can be configured using the ____ function with the spdadd instruction in a shell script.

A)attributes()
B)standards()
C)encrypt()
D)setkey()
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
The Trojan horse named ____ is designed to give the attacker the target's user account and password.

A)NetBus
B)Backdoor.IRC
C)Yoink
D)Trojan.Idly
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Identify five border points that the strongest border security is designed to protect.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Identify five Microsoft Routing and Remote Access Services that enable or manage remote access to Windows Server 2003.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
_________________________ is designed to "provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality" (as defined in the network standard document, RFC 2406).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
A(n)_________________________ is a portion of a network that exists between two or more networks that have different security measures in place.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
____ storage is employed by a computer system to house frequently used data for quick access.

A)RAM
B)Register
C)Cache
D)CD-ROM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
To ensure that the IPTables service starts automatically each time you boot the operating system, use the ____ command.

A)service iptables start
B)chkconfig --level 345 iptables on
C)chkconfig ipchains off
D)/sbin/service iptables save
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
The NAT setup offers addresses in the ____ range as the default option.

A)10.0.0.0
B)172.16.0.0
C)192.168.0.0
D)224.0.0.0
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
What are the main elements involved in a wireless network attack?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Proxies functioning as ____-level gateways create a virtual tunnel between the proxy and an external computer, such as a Web server.

A)network
B)presentation
C)presentation
D)circuit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
A set of filtering rules, called a ____, is applied to packets through the use of IPTables.

A)link
B)group
C)cluster
D)chain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
Provide a description of service packs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
A DoS attack that floods a host with packets from many bogus source addresses is a form of ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Identify four tasks that can be fulfilled by a proxy server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
Identify four network hardening techniques.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
If you want to block access to Telnet using a firewall, then consider blocking TCP/UDP port ____.

A)21
B)23
C)80
D)119
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
____________________ involves taking specific actions to block or prevent attacks by means of operating system and network security methods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
How does a source routing attack work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
How does a buffer attack work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the advantages of using Network Address Translation (NAT)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
command line interface that enables you to configure packet filter rules through the use of tables.
digital certificate
command line interface that enables you to configure packet filter rules through the use of tables.
National Security Institute (NSI)
command line interface that enables you to configure packet filter rules through the use of tables.
worm
command line interface that enables you to configure packet filter rules through the use of tables.
remote denial of service (DoS)attack
command line interface that enables you to configure packet filter rules through the use of tables.
spyware
command line interface that enables you to configure packet filter rules through the use of tables.
sniffer software
command line interface that enables you to configure packet filter rules through the use of tables.
IPTables
command line interface that enables you to configure packet filter rules through the use of tables.
access control list (ACL)
command line interface that enables you to configure packet filter rules through the use of tables.
Security Level Configuration
might take the form of simply flooding a system with more packets than it can handle.
digital certificate
might take the form of simply flooding a system with more packets than it can handle.
National Security Institute (NSI)
might take the form of simply flooding a system with more packets than it can handle.
worm
might take the form of simply flooding a system with more packets than it can handle.
remote denial of service (DoS)attack
might take the form of simply flooding a system with more packets than it can handle.
spyware
might take the form of simply flooding a system with more packets than it can handle.
sniffer software
might take the form of simply flooding a system with more packets than it can handle.
IPTables
might take the form of simply flooding a system with more packets than it can handle.
access control list (ACL)
might take the form of simply flooding a system with more packets than it can handle.
Security Level Configuration
used between network computers to verify the authenticity of the communication.
digital certificate
used between network computers to verify the authenticity of the communication.
National Security Institute (NSI)
used between network computers to verify the authenticity of the communication.
worm
used between network computers to verify the authenticity of the communication.
remote denial of service (DoS)attack
used between network computers to verify the authenticity of the communication.
spyware
used between network computers to verify the authenticity of the communication.
sniffer software
used between network computers to verify the authenticity of the communication.
IPTables
used between network computers to verify the authenticity of the communication.
access control list (ACL)
used between network computers to verify the authenticity of the communication.
Security Level Configuration
tool that may be used to designate a trusted device.
digital certificate
tool that may be used to designate a trusted device.
National Security Institute (NSI)
tool that may be used to designate a trusted device.
worm
tool that may be used to designate a trusted device.
remote denial of service (DoS)attack
tool that may be used to designate a trusted device.
spyware
tool that may be used to designate a trusted device.
sniffer software
tool that may be used to designate a trusted device.
IPTables
tool that may be used to designate a trusted device.
access control list (ACL)
tool that may be used to designate a trusted device.
Security Level Configuration
used by attackers to associate IP address information with account and password communications.
digital certificate
used by attackers to associate IP address information with account and password communications.
National Security Institute (NSI)
used by attackers to associate IP address information with account and password communications.
worm
used by attackers to associate IP address information with account and password communications.
remote denial of service (DoS)attack
used by attackers to associate IP address information with account and password communications.
spyware
used by attackers to associate IP address information with account and password communications.
sniffer software
used by attackers to associate IP address information with account and password communications.
IPTables
used by attackers to associate IP address information with account and password communications.
access control list (ACL)
used by attackers to associate IP address information with account and password communications.
Security Level Configuration
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
digital certificate
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
National Security Institute (NSI)
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
worm
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
remote denial of service (DoS)attack
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
spyware
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
sniffer software
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
IPTables
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
access control list (ACL)
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
Security Level Configuration
a list of permit and deny conditions that can be associated with a particular router interface.
digital certificate
a list of permit and deny conditions that can be associated with a particular router interface.
National Security Institute (NSI)
a list of permit and deny conditions that can be associated with a particular router interface.
worm
a list of permit and deny conditions that can be associated with a particular router interface.
remote denial of service (DoS)attack
a list of permit and deny conditions that can be associated with a particular router interface.
spyware
a list of permit and deny conditions that can be associated with a particular router interface.
sniffer software
a list of permit and deny conditions that can be associated with a particular router interface.
IPTables
a list of permit and deny conditions that can be associated with a particular router interface.
access control list (ACL)
a list of permit and deny conditions that can be associated with a particular router interface.
Security Level Configuration
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
digital certificate
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
National Security Institute (NSI)
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
worm
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
remote denial of service (DoS)attack
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
spyware
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
sniffer software
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
IPTables
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
access control list (ACL)
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
Security Level Configuration
provides information about all kinds of security threats.
digital certificate
provides information about all kinds of security threats.
National Security Institute (NSI)
provides information about all kinds of security threats.
worm
provides information about all kinds of security threats.
remote denial of service (DoS)attack
provides information about all kinds of security threats.
spyware
provides information about all kinds of security threats.
sniffer software
provides information about all kinds of security threats.
IPTables
provides information about all kinds of security threats.
access control list (ACL)
provides information about all kinds of security threats.
Security Level Configuration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Provide a general description for how routers are used in border security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.